Q2S and Security for Wireless and Mobile Networks最新文献

筛选
英文 中文
Throughput and QoS optimization in nonuniform multichannel wireless mesh networks 非均匀多通道无线网状网络的吞吐量和QoS优化
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454589
T. Szymanski
{"title":"Throughput and QoS optimization in nonuniform multichannel wireless mesh networks","authors":"T. Szymanski","doi":"10.1145/1454586.1454589","DOIUrl":"https://doi.org/10.1145/1454586.1454589","url":null,"abstract":"A technology to increase throughput and QoS in infrastructure-based Wireless Mesh Networks (WMNs) is proposed. In a uniform WMN, let each Base Station (BS) have R1 transceivers for communications with neighboring BSs, and R2 transceivers for communications with the Stationary and Mobile Subscribers within the wireless cell. One Gateway BS provides access to the global Internet, and the throughput capacity of the entire WMN is constrained by the IO bandwidth of the Gateway. A small number of extra wireless links can be added to the Gateway BS and selected other BSs, resulting in a nonuniform system. The addition of an asymptotically small number of transceivers can increase WMN capacity several fold. Efficient scheduling requires the partitioning of an asymmetric bipartite graph representing a general traffic rate matrix, into multiple graphs representing doubly-stochastic matrices. Routing and scheduling algorithms presented. The algorithms can provision long-term multimedia flows including VOIP or IPTV with guaranteed service. For multichannel WMNs where the traffic is routed and partitioned, the number of queued cells per BS is near-minimal and bounded, the end-to-end delay and jitter are near-minimal and bounded, and cell loss rates due to scheduling conflicts are zero. The algorithm also achieves 100% of capacity.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114496188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance evaluation of real-time schedulers for HCCA function in IEEE 802.11e wireless networks IEEE 802.11e无线网络中HCCA功能实时调度器的性能评估
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454588
G. Cecchetti, A. L. Ruscelli
{"title":"Performance evaluation of real-time schedulers for HCCA function in IEEE 802.11e wireless networks","authors":"G. Cecchetti, A. L. Ruscelli","doi":"10.1145/1454586.1454588","DOIUrl":"https://doi.org/10.1145/1454586.1454588","url":null,"abstract":"IEEE 802.11 standard for wireless networks recently has been enhanced with IEEE 802.11e amendment to this protocol which introduces Quality of Service support. It provides differentiation mechanisms at the Medium Access Control layer, using two additional access functions: the Enhanced Distributed Channel Access (EDCA) function and the HCF Controlled Channel Access (HCCA) function.\u0000 The EDCA function is based on a distributed control and enables prioritized channel access while the latter requires centralized scheduling and allows the applications to negotiate parameterized service guarantees. Only HCCA mechanism is suitable for serving traffic streams with real-time requirements such as multimedia applications and Voice Over IP. The IEEE 802.11e standard does not specify a mandatory HCCA scheduling algorithm, while it offers a reference scheduler.\u0000 In this paper we analyze four HCCA schedulers which are alternative to the reference one and which offer real-time guarantees. A performance evaluation through simulation is conducted to show the main differences between the considered schedulers, including the reference one.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124392564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Adaptive traffic filtering for efficient and secure IP-mobility 自适应流量过滤,实现高效、安全的ip移动
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454594
Mirco Marchetti, M. Colajanni
{"title":"Adaptive traffic filtering for efficient and secure IP-mobility","authors":"Mirco Marchetti, M. Colajanni","doi":"10.1145/1454586.1454594","DOIUrl":"https://doi.org/10.1145/1454586.1454594","url":null,"abstract":"The Mobile IP (MIP) protocol that supports node mobility in IP networks may be implemented through two routing schemes: triangular routing and reverse tunneling. While triangular routing guarantees better performance because of shorter routing paths, it is not compatible with egress filtering policies enforced by many firewalls. As a result, it is necessary to recur to the slower reverse tunneling routing scheme that causes lower mobile connection throughput and higher round trip times. In this paper, we propose an innovative adaptive traffic filtering technique in which egress filtering rules are dynamically and automatically modified to reflect the presence of mobile nodes inside the protected network. The proposed scheme, called secure triangular routing, guarantees the best trade-off between performance and security because it enables triangular routing without violating network security policies. Viability and performance improvements of the proposed solution have been demonstrated by experiments carried out through a prototype. The proposed solution does not require any modification in correspondent nodes or in their networks, and it fully complies with the MIP protocol specifications.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132158809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast, secure handovers in 802.11: back to the basis 在802.11中快速、安全的移交:回到基础
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454592
R. Marques, A. Zúquete
{"title":"Fast, secure handovers in 802.11: back to the basis","authors":"R. Marques, A. Zúquete","doi":"10.1145/1454586.1454592","DOIUrl":"https://doi.org/10.1145/1454586.1454592","url":null,"abstract":"This article presents a fast, secure handover protocol for 802.11 networks. The protocol keeps the security functionalities of 802.1X but uses a new reauthentication protocol that promotes fast handovers during reassociations. The reauthentication protocol recovers the original 802.11 paradigm: authenticate first, reassociate next. Following this paradigm, we conceived two new 802.11 authentication and reassociation protocols, which allow a mobile station to perform 802.1X reauthentications before reassociations with the same functionality of a complete 802.1X authentication. Furthermore, reassociation protocols are authenticated, preventing denial-or-service scenarios that are not handled by 802.11i. Our new approach requires little from the environment, namely a new, central Reauthentication Service, for storing data used in the reauthentication of stations. The time of security-related tasks that contribute to handover delays was dramatically reduced to 1.5 ms, while an 802.1X fast resume takes more than 150 ms. Finally, our protocol addresses most design goals and problems stated by standards' working groups for fast, secure roaming in 802.11.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
TSR: trust-based secure MANET routing using HMMs TSR:使用hmm的基于信任的安全MANET路由
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454602
M. Moe, B. Helvik, S. J. Knapskog
{"title":"TSR: trust-based secure MANET routing using HMMs","authors":"M. Moe, B. Helvik, S. J. Knapskog","doi":"10.1145/1454586.1454602","DOIUrl":"https://doi.org/10.1145/1454586.1454602","url":null,"abstract":"In this paper we propose a trust-based security extension to the mobile ad hoc network dynamic source routing protocol (DSR), where the state probability of a node, according to its corresponding hidden Markov model (HMM), is being used for deciding the node's trustworthiness. Our approach detects the selective packet dropping behavior of selfish nodes that could not be detected or defended against with previous suggested solutions. Packet-dropping nodes that are acting selfishly by selectively dropping packets and not sharing their bandwidth with the rest of the network, are excluded from the network. Thus enforcing cooperation among nodes and removing the incentives for selfish node behavior.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Secure authentication and management scheme for RFID RFID安全认证与管理方案
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454605
Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho
{"title":"Secure authentication and management scheme for RFID","authors":"Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho","doi":"10.1145/1454586.1454605","DOIUrl":"https://doi.org/10.1145/1454586.1454605","url":null,"abstract":"This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID to be applied in the ubiquitous computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the passive-tag-performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive/active-tag management technique based on a secure password-based system, with the RFID tag authentication system, is proposed in this study. This system performs a secure authentication process and provides an efficient and secure management system.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133936402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A distributed resource management scheme for load-balanced QoS provisioning in heterogeneous mobile wireless networks 一种异构移动无线网络中负载均衡QoS提供的分布式资源管理方案
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454598
S. Ahmad, M. Qadir, M. Akbar
{"title":"A distributed resource management scheme for load-balanced QoS provisioning in heterogeneous mobile wireless networks","authors":"S. Ahmad, M. Qadir, M. Akbar","doi":"10.1145/1454586.1454598","DOIUrl":"https://doi.org/10.1145/1454586.1454598","url":null,"abstract":"Quality of Service (QoS) provisioning in wireless networks quickly leads to scalability problem due to hard resource allocation of each session. Heterogeneous wireless environment provides alternative resources, but the complexity of handling such system is very high. In this paper, we present a virtual resource provisioning (VPR) scheme that collaborates with co-located wireless networks regarding resource availability and estimates resource release in near future to maintain predictive resource list for optimal resource utilization. Resource utilization is further supported by a fine-grained QoS service sub-class design for making precise resource allocation. These sub-classes map demanded QoS requirements to their subset, enabling more resource availability. Results show that much higher call admission rates are achieved by integrating virtual resource provisioning and load-balancing approach.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116120840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
In-network optimal rate reduction for packetized MPEG video 分组MPEG视频的网络最优速率降低
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454597
G. Ravindra, Joseph Thaliath, I. Chakeres
{"title":"In-network optimal rate reduction for packetized MPEG video","authors":"G. Ravindra, Joseph Thaliath, I. Chakeres","doi":"10.1145/1454586.1454597","DOIUrl":"https://doi.org/10.1145/1454586.1454597","url":null,"abstract":"Bottleneck links in network elements cause packet queues to overflow thereby resulting in random packet loss. This problem is a big issue at the boundary of wired and wireless networks, and it can cause streamed media applications to perform poorly. For streamed MPEG video, packet loss can induce an incorrect MPEG video bit-stream syntax. At the video player the corrupt stream leads to an improper decoding of frames resulting in a poor viewer experience that can include frame corruption, frame freezing and tiling artifacts. Even very few packet losses can result in a noticeable decay in perceived video quality. To solve this problem, we propose a deterministic in-network selective packet forwarding algorithm that preserves MPEG video syntax while reducing the bandwidth of the video stream to be below the bottleneck bandwidth. Optimality of the forwarding algorithm is achieved by solving a 0-1 knapsack problem using estimated video parameters. We evaluate the proposed scheme for real MPEG-2 and MPEG-4 video streams. The performance of the proposed algorithm is evaluated in terms of the reduction in the number of bit stream syntax errors in addition to the rate optimality.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121583795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trust transferability among similar contexts 相似背景下的信任可转移性
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454603
Mozhgan Tavakolifard, S. J. Knapskog, P. Herrmann
{"title":"Trust transferability among similar contexts","authors":"Mozhgan Tavakolifard, S. J. Knapskog, P. Herrmann","doi":"10.1145/1454586.1454603","DOIUrl":"https://doi.org/10.1145/1454586.1454603","url":null,"abstract":"Trust is a fundamental concern in electronic transactions and behavior of people are influenced by the situation. Motivated by that we present a state-of-the-art survey of context representation in trust management and provide main directions along which research efforts have been done. We propose a generalized model which considers different aspects of the relationship between context-awareness and trust management.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks 移动自组网中基于优先级的qos感知MAC协议(PQAMP)
Q2S and Security for Wireless and Mobile Networks Pub Date : 2008-10-27 DOI: 10.1145/1454586.1454600
N. Sarma, Sukumar Nandi
{"title":"A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks","authors":"N. Sarma, Sukumar Nandi","doi":"10.1145/1454586.1454600","DOIUrl":"https://doi.org/10.1145/1454586.1454600","url":null,"abstract":"In this paper, we provide higher channel access priority to frames belonging to real-time traffic with smaller contention windows as compared to frames belonging to besteffort traffic. Further, to reduce channel access delay in multihop environment, we give higher access priorities to relayed frames, within a QoS class, as compared to the generated frames within the same class. Besides introducing channel access priorities at MAC layer, proper queuing management scheme is implemented to improve the QoS support at flow level. Both analytical and simulation results show the improved QoS for real-time traffic.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信